Best Practical Solutions RT 3.8.0 through 3.8.9 and 4.0.0rc through 4.0.0rc7, when the CustomFieldValuesSources (aka external custom field) option is enabled, allows remote authenticated users to execute arbitrary code via unspecified vectors, as demonstrated by a cross-site request forgery (CSRF) attack.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2011/1071 | vdb entry |
http://lists.bestpractical.com/pipermail/rt-announce/2011-April/000188.html | mailing list patch |
https://bugzilla.redhat.com/show_bug.cgi?id=696795 | patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/66791 | vdb entry |
http://blog.bestpractical.com/2011/04/security-vulnerabilities-in-rt.html | vendor advisory |
http://www.securityfocus.com/bid/47383 | vdb entry |
http://lists.bestpractical.com/pipermail/rt-announce/2011-April/000187.html | mailing list patch |
http://www.debian.org/security/2011/dsa-2220 | vendor advisory |
http://secunia.com/advisories/44189 | third party advisory vendor advisory |